A key delivery method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the method including transmitting an item entitlement control message (iecm) including item control information, transmitting a stream entitlement control message (SECM) including stream control information, and combining at least part of the item control information and at least part of the stream control information to produce the first item control word. Related methods and apparatus are also disclosed.

Patent
   6587561
Priority
Mar 04 1998
Filed
Feb 04 1999
Issued
Jul 01 2003
Expiry
Feb 04 2019
Assg.orig
Entity
Large
122
20
all paid
1. A key delivery method for use in an encoded communications system in which a first plurality of encoded items comprising at least a first item encoded with a first item control word and a second item encoded with a second item control word is sent in a communication stream from a sender to a receiver, the method comprising:
transmitting a first item entitlement control message (iecm) comprising first item control information for controlling only the first item and a second iecm comprising second item control information for controlling only the second item;
transmitting a stream entitlement control message (SECM) comprising stream control information for controlling more than one item;
combining at least part of the first item control information and at least part of the stream control information to produce the first item control word; and
combining at least part of the second item control information and at least part of the stream control information to produce the second item control word,
wherein said transmitting-iecm step is performed before said transmitting-SECM step.
2. A method according to claim 1 and also comprising:
performing at least one of the following:
utilizing the first item control word to decode the first encoded item; and
utilizing the second item control word to decode the second encoded item.
3. A method according to claim 1 and wherein:
the first item control information comprises a first item key, and
the second item control information comprises a second item key, and
the stream control information comprises a stream key, and
the combining step comprises: computing the first item control word from the first item key and the stream key; and computing the second item control word from the second item key and the stream key.
4. A method according to claim 1 and wherein:
the first item control information comprises a first item seed, and
the second item control information comprises a second item seed,
the stream control information comprises a stream seed, and
the combining step comprises:
computing a first item key from the first item seed using an item key production function;
computing a second item key from the second item seed using the item key production function;
computing a stream key from the stream seed using a stream key production function;
computing the first item control word from the first item key and the stream key; and
computing the second item control word from the second item key and the stream key.
5. A method according to claim 4 and wherein the step of computing an first item key comprises:
determining whether the receiver is authorized to compute the first item key and computing the first item key only if the receiver is authorized to compute the item key, and
the step of computing a second item key comprises:
determining whether the receiver is authorized to compute the second item key and computing the second item key only if the receiver is authorized to compute the second item key.
6. A method according to claim 4 and wherein the step of computing a stream key comprises:
determining whether the receiver is authorized to compute the stream key and computing the stream key only if the receiver is authorized to compute the stream key.
7. A method according to claim 1 and wherein the at least one encoded item is transmitted asynchronously to the SECM.
8. A method according to claim 1 and wherein each of said first plurality of encoded items has a time duration, and
said SECM comprises a second plurality of SECMs transmitted with an average inter-SECM delay, and
each of said first plurality of encoded items is associated with one of the second plurality of SECMs, and
the time duration of at least one of said first plurality of encoded items is less than the average inter-SECM delay.
9. A method according to claim 8 and wherein more than one of said first plurality of encoded items is associated with at least one of said second plurality of SECMs.
10. A method according to claim 1 and wherein the first encoded item and the second encoded item are transmitted simultaneously.
11. A method according to claim 1 and wherein at least one of the first item control information and the second item control information comprises item purchase information.
12. A method according to claim 11 and wherein the item purchase information includes item price information.
13. A method according to claim 11 and wherein the item purchase information comprises purchase access information and the method includes:
determining whether the receiver is entitled to purchase at least one of the first item and the second item based, at least in part, on the purchase access information.
14. A method according to claim 11 and wherein the item purchase information comprises access information and the method includes:
determining whether the receiver is entitled to access at least one of the first item and the second item based, at least in part, on the access information.
15. A method according to claim 1 and wherein the stream control information comprises item purchase information.
16. A method according to claim 1 and wherein the first item is broadcast to a plurality of item receivers including the receiver.
17. A method according to claim 16 and wherein the transmitting-iecm step includes broadcasting at least one of the first iecm and the second iecm.
18. A method according to claim 16 and wherein the step of transmitting an SECM includes broadcasting the SECM.
19. A method according to claim 1 and wherein each of the plurality of encoded items has a time duration, and
the time duration of the first item and the time duration of the second item at least partially overlap.

The present invention relates to broadcast systems in general, and in particular to data broadcast systems, especially to systems providing Conditional Access services.

Systems for ensuring that, in a pay or subscription broadcast system, only those who have paid to receive broadcast content actually do receive the broadcast content are well-known in the art. Such systems, which often include many other features, are known as Conditional Access (CA) systems. Typically, pay broadcast systems generally broadcast encrypted material and utilize a CA system to deliver one or more appropriate decryption keys to authorized receivers only.

One CA system is described in U.S. Pat. Nos. 5,282,249 and 5,481,609, both to Cohen et al. The two Cohen et al. patents describe a scrambled television system. Scrambled television transmissions described in the Cohen et al. patents include both scrambled data representing television signals and coded control messages, also known in the art as ECMs. The ECMs of Cohen et al. include, in a coded form, data necessary for generating a control word (CW) which may be used to descramble the scrambled data representing television signals.

Data necessary for generating a control word is known in the prior art to take many different forms and may include, in general, at least any of the following: a control word; an encrypted control word which is intended to be decrypted before use; and a seed to a generating function such as, for example, a one-way function which generates the control word upon input of the seed. Throughout the present specification and claims the terms "control word generating information" and "CW generating information" are used interchangeably to designate data necessary for generating a control word in any appropriate form, as described above.

While the two patents to Cohen et al. describe an analog system, that is, a system in which analog television data streams are broadcast to television sets, it is appreciated that similar ECM methods may also be used for digital television data streams, it being appreciated that scrambling methods appropriate to digital data would be used in digital television data streams.

The system of Cohen et al. and other systems described in the art share a feature of broadcasting an ECM synchronous to, generally immediately before or in a data stream parallel to, the actual scrambled broadcast. Typically, such an ECM is valid for a brief duration, with a new ECM being broadcast, in synchrony with a scrambled broadcast scrambled according to a new key, a few seconds, such as 10 seconds, after the broadcast of the previous ECM. Some systems have been described in which a key is sent, whether by broadcasting or by other means such as by mail, with a lower frequency, even once a month. Such a system is described, for example, in U.S. Pat. Nos. 4,484,027 and Re 33,189 to Lee et al.

Patents describing systems related to encrypted broadcasting and/or key distribution in encrypted broadcasting systems include the following:

U.S. Pat. No. 4,228,321 to Flanagan describes a privacy transmission system with remote key control, in which key control signals are produced at the unscrambling location and are both used for unscrambling at that location and also transmitted to a scrambling location for use in scrambling.

U.S. Pat. No. 4,531,020 to Wechselberger et al describes a method for controlling the simultaneous broadcast of enciphered digital information signals, for example in a radio or television broadcast environment, to a plurality of subscribers using several levels of enciphering keys.

U.S. Pat. No. 4,531,021 to Bluestein et al describes enciphering digital information for transmission using a first key, common to all receivers, and a second key specific to one receiver of a small group of receivers.

U.S. Pat. No. 4,864,615 to Bennett et al describes a system for reproduction of secure keys by using distributed key generation data and a distributed encrypted prekey.

U.S. Pat. No. 4,866,770 to Seth-Smith et al describes a system for distributing video, audio, teletext, and data, in which system wide, individual decoder and group decoder control signals are transmitted as part of a composite signal. The group decoder control signal includes information relating to a group of decoders, while the individual decoder control signal includes information relating to the operation of individual decoders.

U.S. Pat. No. 4,944,006 to Citta et al describes a secure data packet transmission system utilizing a global encryption key as well as address keys for encrypting individually addressed bit packets.

U.S. Pat. No. 5,301,247 to Rasmussen et al. describes a method for ensuring secure communications, in which two keys are combined together to produce a session key.

U.S. Pat. No. 5,499,298 to Narasimhalu et al describes a method for controlled dissemination of digital information, in which encrypted digital information is decrypted by a tamper-proof controlled information access device, which access being provided according to conditions specified by an information provider.

In general, methods of transmitting a scrambled digital signal, including ECMs, are well known. Some systems use a composite signal, that is, an analog or digital signal including a plurality of components. Typically the plurality of components includes both a scrambled television signal component and an ECM component, the ECM component comprising a plurality of ECMs. Prior art references which discuss examples of this type of signal include the following: DVB ETR289, "Digital Video Broadcasting (DVB): Support for use of scrambling and conditional access (CA) within digital broadcasting systems"; and DVB SIM061, "Technical specification of DVB-Simulcrypt", Apr. 1, 1997.

Other documents relating to broadcasting of digital information include the DVB Specification for Data Broadcasting, document SI-DAT 360 (TM 1779), Feb. 12, 1997; and ATSC Digital Television Standard, document A54, October 1995 and subsequent editions.

Other methods of transmitting a scrambled digital signal, particularly useful in a case where the signal includes sub-signals encoded according to various different methods, are described in "Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications", DVB document A017, May 1996 and subsequent editions; and in "Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications", CENELEC EN50221:1997.

The disclosures of all references mentioned above and throughout the present specification are hereby incorporated herein by reference.

The present invention seeks to provide an improved method for delivering a control word or key relating to an item. The present method is particularly useful in cases where the item is relatively short in duration and is transmitted asynchronously relative to an ECM stream; that is, time synchronization of the item and an associated ECM in the ECM stream cannot be guaranteed, typically because of the short duration of the item. The present method is also particularly useful in cases where the number of items is very large, and it may be impractical to assign a separate ECM stream to each item.

Cases of the types referred to may occur particularly in a data broadcast network, where a defined data item, such as a computer program or a multimedia item, is broadcast to subscribers or customers who have subscribed to or are otherwise authorized to receive the item. An item of this type may be of relatively short duration, such as between a fraction of a second and a few seconds, and there may be a very large number of items,

Existing methods of sending an ECM stream synchronized with a data stream, such as a data stream comprising a television program, are inadequate to provide for control word or key delivery in the cases described above, since state of the art ECM delivery mechanisms are not able to provide synchronization to the sub-second level.

There is thus provided in accordance with a preferred embodiment of the present invention a key delivery method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the method including transmitting an item entitlement control message (IECM) including item control information, transmitting a stream entitlement control message (SECM) including stream control information, and combining at least part of the item control information and at least part of the stream control information to produce the first item control word.

Further in accordance with a preferred embodiment of the present invention the transmitting-IECM step is performed before the transmitting-SECM step.

Still further in accordance with a preferred embodiment of the present invention the transmitting-IECM step is performed simultaneously with the transmitting-SECM step.

Additionally in accordance with a preferred embodiment of the present invention the method also includes utilizing the first item control word to decode the at least one encoded item.

Moreover in accordance with a preferred embodiment of the present invention the item control information includes an item key, and the stream control information includes a stream key, and the combining step includes computing the first item control word from the item key and the stream key.

Further in accordance with a preferred embodiment of the present invention the item control information includes a first seed, and the stream control information includes a second seed, and the combining step includes computing an item key from the first seed using an item key production function, computing a stream key from the second seed using a stream key production function, and computing the first item control word from the item key and the stream key.

Still further in accordance with a preferred embodiment of the present invention the step of computing an item key includes determining whether the receiver is authorized to compute the item key and computing the item key only if the receiver is authorized to compute the item key.

Additionally in accordance with a preferred embodiment of the present invention the step of computing a stream key includes determining whether the receiver is authorized to compute the stream key and computing the stream key only if the receiver is authorized to compute the stream key.

Moreover in accordance with a preferred embodiment of the present invention the at least one encoded item is transmitted asynchronously to the SECM.

Further in accordance with a preferred embodiment of the present invention the at least one encoded item includes a first plurality of encoded items.

Still further in accordance with a preferred embodiment of the present invention each of the first plurality of encoded items has a time duration, and the SECM includes a second plurality of SECMs transmitted with an average inter-SECM delay, and each of the first plurality of encoded items is associated with one of the second plurality of SECMs, and the time duration of at least one of the first plurality of encoded items is less than the average inter-SECM delay.

Additionally in accordance with a preferred embodiment of the present invention more than one of the first plurality of encoded items is associated with at least one of the second plurality of SECMs.

Moreover in accordance with a preferred embodiment of the present invention the first plurality of encoded items includes at least a first encoded item and a second encoded item, and the first encoded item and the second encoded item are transmitted substantially simultaneously.

Further in accordance with a preferred embodiment of the present invention the at least one encoded item includes a plurality of encoded items including a second item encoded with a second item control word, the method also including transmitting a second SECM including second stream control information, and combining the item control information and the second stream control information to produce the second item control word.

Still further in accordance with a preferred embodiment of the present invention the item control information includes item purchase information.

Additionally in accordance with a preferred embodiment of the present invention the first stream control information includes item purchase information.

Moreover in accordance with a preferred embodiment of the present invention the second stream control information includes item purchase information.

Further in accordance with a preferred embodiment of the present invention the item purchase information includes item price information.

Still further in accordance with a preferred embodiment of the present invention the item purchase information includes purchase access information and the method includes determining whether the receiver is entitled to purchase the first item based, at least in part, on the purchase access information.

Additionally in accordance with a preferred embodiment of the present invention the item purchase information includes access information and the method includes determining whether the receiver is entitled to access the first item based, at least in part, on the access information.

Moreover in accordance with a preferred embodiment of the present invention the first item is broadcast to a plurality of item receivers including the receiver.

Further in accordance with a preferred embodiment of the present invention the step of transmitting an IECM includes broadcasting the IECM.

Still further in accordance with a preferred embodiment of the present invention the step of transmitting an SECM includes broadcasting the SECM.

There is also provided in accordance with another preferred embodiment of the present invention a key production method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver and in which an item entitlement control message (IECM) including item control information and a stream entitlement control message (SECM) including stream control information are also sent from the sender to the receiver, the method including extracting at least part of the item control information from the IECM and at least part of the stream control information from the SECM, and combining the at least part of the item control information and the at least part of the stream control information to produce the first item control word.

There is also provided in accordance with another preferred embodiment of the present invention a key delivery subsystem for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the key delivery subsystem including an item entitlement control message (IECM) production unit operative to produce an IECM including item control information, a stream entitlement control message (SECM) production unit operative to produce a SECM including stream control information, transmitting apparatus receiving the IECM from the IECM production unit and the SECM from the SECM production unit and operative to transmit the IECM and the SECM to the receiver, and combining apparatus located at the receiver for combining at least part of the item control information and at least part of the stream control information to produce the first item control word.

There is also provided in accordance with another preferred embodiment of the present invention a key production subsystem for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver and in which an item entitlement control message (IECM) including item control information and a stream entitlement control message (SECM) including stream control information are also sent from the sender to the receiver, the key production subsystem including a control information extractor for extracting at least part of the item control information from the IECM and at least part of the stream control information from the SECM, and control word production apparatus for combining the at least part of the item control information and the at least part of the stream control information to produce the first item control word.

The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:

FIG. 1A is a simplified partly pictorial, partly block diagram illustration of a key delivery system constructed and operative in accordance with a preferred embodiment of the present invention;

FIG. 1B is a simplified partly pictorial, partly block diagram illustration of a key delivery system constructed in accordance with an alternative preferred embodiment of the present invention;

FIG. 2A is a simplified block diagram illustration of a preferred embodiment of an IECM of FIG. 1;

FIG. 2B is a simplified block diagram illustration of a preferred embodiment of a stream ECM of FIG. 1;

FIG. 3 is a simplified flowchart illustration of a preferred method of operation of the systems of FIGS. 1A and 1B; and

FIG. 4 is a simplified pictorial illustration of a preferred implementation of the headend of FIGS. 1A and 1B.

Reference is now made to FIG. 1A which is a simplified partly pictorial, partly block diagram illustration of a key delivery system constructed and operative in accordance with a preferred embodiment of the present invention. The system of FIG. 1A typically comprises a headend 100 and at least one subscriber unit 110. Except as described below, the headend 100 and the at least one subscriber unit 110 may be similar to units which are well known in the art. Typically, a multiplicity of subscriber units 110 is provided, only one subscriber unit 110 being shown in FIG. 1A for brevity of description.

The operation of the system of FIG. 1A is now briefly described. The headend 100 is operative to establish an IECM stream 120, the IECM stream 120 comprising a communication stream, as is well known in the art, from the headend 100 to the at least one subscriber unit 110. The IECM stream 120 is typically operative, as described below, to carry at least one item ECM (IECM) such as an IECM 130, transmitted by the headend 100.

The IECM stream 120 typically comprises a logical stream which is carried by any appropriate physical communications channel (not shown), such as, for example, any appropriate one or combination of the following, which are well known in the art: a cable transmission system; a satellite transmission system; a terrestrial transmission system; and a data network, such as a local area network (LAN), a wide area network (WAN), or another data network. Establishing a stream, particularly a CA stream for carrying ECMs, over a physical communication channel is well known in the art and is described, for example, in DVB ETR289, "Digital Video Broadcasting (DVB): Support for use of scrambling and conditional access (CA) within digital broadcasting systems", referred to above.

Reference is now additionally made to FIG. 2A which is a simplified block diagram illustration of a preferred implementation of the IECM 130. ECMs known in the art typically comprise CW generating information, as explained above, in the Background of the Invention. The IECM 130 is typically similar to an ECM as is well known in the art except that the IECM 130 comprises item control information 140 which is typically provided instead of or in addition to CW generating information comprised in prior art ECMs.

The subscriber unit 110 is typically operative, upon receiving the IECM 130, to extract the item control information 140 therefrom, using methods which are well known in the art. The item control information 140 typically comprises information relating to access to an individual broadcast item to be broadcast at some time, whether in the past, in the present, or in the future. Preferably, the subscriber unit 110 includes an ECM interpretation unit 145 which is operative to extract a first key Ski from the IECM 130, typically according to a first generator function f1, such that:

Ski=f1(IECMi)

where IECMi represents the IECM 130, taken to be the ith from a plurality of IECMs. The ECM interpretation unit 145 may comprise a control information extractor (not shown) and control word production apparatus (not shown) each of which perform part of the function of the ECM interpretation unit 145 as described herein, but combination of these functions into a single unit 145 is believed to be preferable and only the ECM interpretation unit 145 is described herein for simplicity of description.

The first generator function f1 may comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art.

The item control information 140 typically also comprises other information relating to access to an individual broadcast item to be broadcast at some time, whether in the past, in the present, or in the future. Such other information may be similar to information typically included in prior art ECMs, and may include, without limiting the generality of the foregoing, one or more of the following: information defining which recipients may receive the individual broadcast item; one or more prices associated with the individual broadcast item; information defining which recipients may purchase the individual broadcast item; information defining which price a given recipient must pay to purchase the individual broadcast item; and geographic information defining regions within which the individual broadcast item may be received and/or purchased. Preferably, the subscriber unit 110 processes the IECM 130 in accordance with such other information, if present, so that, for example, no further processing is typically performed if the subscriber unit 110 is not authorized to receive the associated individual broadcast item. Similar processing, in the case of prior art ECMs, of such other information is well known in the art.

The headend 100 is also preferably operative to establish other streams, such as, for example, at least one ECM stream 150 and at least one service stream 160, for transmitting from the headend 100 to the subscriber unit 110.

The service stream 160 is typically operative to carry a plurality of items 170, each of the plurality of items 170 being encoded according to a control word. Typically, each one of the control words associated with each one of the plurality of items 170 is different from every other one of the control words.

Reference is now additionally made to FIG. 1B, which is a simplified partly pictorial, partly block diagram illustration of a key delivery system constructed and operative in accordance with an alternative preferred embodiment of the present invention. The system of FIG. 1B is similar to that of FIG. 1A, with the service stream 160 of FIG. 1A being replaced with a plurality of service streams, shown for the sake of simplicity of depiction in FIG. 1B as 4 service streams 161-164, it being appreciated that any appropriate number of service streams may be used. It may be undesirable or impractical, particularly from the standpoint of system resource usage, to establish an ECM stream for each of the service streams 161-164; only one ECM stream 150 is shown in FIG. 1B. It is appreciated that the apparatus and methods described herein with reference to FIG. 1A are also applicable to the system of FIG. 1B.

Referring back to FIG. 1A, the subscriber unit 110 may be authorized to receive and decode a specific itemi 175 of the plurality of items 170, but may not necessarily be authorized to receive and decode any other one of the plurality of items 170.

The ECM stream 150 is typically operative to carry a plurality of stream ECMs 180 including a stream ECMs 185. The stream ECMs 185 is associated with the itemi 175, using appropriate methods well known in the art. The stream ECMs 185 may typically also be associated with at least one other of the plurality of items 170, because the items 175 is typically relatively short in duration and is transmitted asynchronously relative to an ECM stream. It is appreciated that, in the implementation of FIG. 1B, the itemi 175 may also be transmitted simultaneously with at least one other of the plurality of items 170. Thus, time synchronization of the itemi 175 and the associated stream ECMs 185 in the ECM stream 150 cannot be guaranteed, typically because of the short duration of the itemi 175 and/or because of overlap in time of the itemi 175 with at least one other item 170, and it may therefore be preferred to broadcast a single stream ECM 180 for a plurality of items 170.

Reference is now additionally made to FIG. 2B, which is a simplified block diagram illustration of a preferred implementation of one of the plurality of stream ECMs 180 of FIG. 1. The stream ECM 180 of FIG. 2B preferably comprises stream control information 186.

The subscriber unit 110 is typically operative, upon receiving the stream ECMS 185, to extract the stream control information 186 therefrom, using methods which are well known in the art. The stream control information 186 typically comprises information relating to access to a stream comprising a plurality of broadcast items, as explained above. Preferably, the subscriber unit 110 includes an ECM interpretation unit 145, as described above, which is operative to extract a stream control word CWS from the stream ECMS 185, typically according to a second generator function f2, such that:

CWS=f2(ECMs)

The second generator function f2 may be equivalent to the first generator function f1 or may alternatively comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art.

The ECM interpretation unit 145 is then preferably operable to compute an item control word for the itemi 175, typically according to a third generator function f3, such that:

CWi=f3 (SKi, CWs)

The third generator function f3 may be equivalent to the first generator function f1 or to the second generator function f2 or may alternatively comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art. It is appreciated that in a simulcrypt environment as described, for example, in DVB SIM061, "Technical specification of DVB-Simulcrypt", referred to above in the Background of the Invention, the third generator function f3 will typically be shared among different encryption methods which make up the simulcrypt multiple encryption scheme.

It is appreciated that access to the itemi 175 may thus be controlled by access information in any one or combination of the IECM 130 or the stream ECMs 185, possibly in combination with other access information (not shown) as is well known in the art.

Reference is now made to FIG. 3, which is a simplified flowchart illustration of a preferred method of operation of the systems of FIGS. 1A and 1B. The method of FIG. 3 preferably includes the following steps:

When an IECM is received by a subscriber unit (step 190), the subscriber unit extracts item control information relating to a future broadcast item from the IECM, typically using a first generator function (step 200).

When a stream ECM including broadcast control information for the broadcast item is received (step 210), stream control information is extracted from the stream ECM, typically using a second generator function (step 220).

The item control information and the stream control information are combined, typically using a third generator function, to produce a control word for descrambling the broadcast item (step 230).

Reference is now made to FIG. 4 which is a simplified pictorial illustration of a preferred implementation of the headend 100 of FIGS. 1A and 1B. The headend 100 of FIG. 4 comprises an IECM production unit 240 which is preferably operative to produce IECMs. The headend 100 also comprises a SECM production unit 250 which is preferably operative to produce SECMs. Both the IECM production unit 240 and the SECM production unit 250 may typically be implemented in any suitable combination of hardware and software such as, for example, in a suitably programmed microprocessor. The IECM production unit 240 and the SECM production unit 250 are typically in communication with conventional headend elements, well known in the art, which typically provide information and instructions including information on the contents of any IECMs and SECMs produced.

The headend 100 also comprises transmitting apparatus 260, which may comprise any suitable transmitting apparatus. The transmitting apparatus 260 receives one or more IECMs from the IECM production unit 240 and/or one or more SECMs from the SECM production unit 250 and is preferably operative to transmit the IECMs and/or SECMs to the subscriber unit 110 (not shown in FIG. 4).

It is appreciated that the headend 100 typically also comprises many other conventional elements well known in the art.

It is appreciated that various features of the invention which are, for clarity, described in the contexts of separate embodiments may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment may also be provided separately or in any suitable subcombination.

It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the invention is defined only by the claims which follow.

Sered, Yishai, Dallard, Nigel Stephen

Patent Priority Assignee Title
10102648, Dec 12 2011 GOOGLE LLC Browser/web apps access to secure surface
10212460, Dec 12 2011 GOOGLE LLC Method for reducing time to first frame/seek frame of protected digital content streams
10452759, Dec 12 2011 GOOGLE LLC Method and apparatus for protection of media objects including HTML
10572633, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for instantiating plugin from within browser
10691778, Sep 24 2004 GOOGLE LLC Method and system for providing secure codecs
6912513, Oct 29 1999 Sony Corporation; Sony Electronics Inc. Copy-protecting management using a user scrambling key
6965993, Nov 09 1999 GOOGLE LLC Process and streaming server for encrypting a data stream
7007170, Mar 18 2003 GOOGLE LLC System, method, and apparatus for securely providing content viewable on a secure device
7039938, Jan 02 2002 Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION Selective encryption for video on demand
7043473, Nov 22 2000 GOOGLE LLC Media tracking system and method
7120250, Sep 09 2002 Sony Corporation; Sony Electronics INC Content distribution for multiple digital rights management
7124303, Jun 06 2001 Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION Elementary stream partial encryption
7127619, Jun 06 2001 Sony Corporation; Sony Electronics INC Decoding and decryption of partially encrypted information
7150045, Dec 14 2000 GOOGLE LLC Method and apparatus for protection of electronic media
7151833, Sep 09 2002 Sony Corporation; Sony Electronics Selective encryption to enable trick play
7155012, Jan 02 2002 Sony Corporation; Sony Electronics Inc. Slice mask and moat pattern partial encryption
7155611, Dec 22 1999 IRDETO B V Method of operating a conditional access system for broadcast applications
7165175, Sep 06 2000 GOOGLE LLC Apparatus, system and method for selectively encrypting different portions of data sent over a network
7215770, Jan 02 2002 Sony Corporation; Sony Electronics, INC System and method for partially encrypted multimedia stream
7218738, Jan 02 2002 Sony Corporation; Sony Electronics Inc. Encryption and content control in a digital broadcast system
7225164, Feb 15 2000 Sony Corporation; SONY ELECTRONIS, INC Method and apparatus for implementing revocation in broadcast networks
7233669, Jan 02 2002 Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION Selective encryption to enable multiple decryption keys
7242773, Sep 09 2002 Sony Corporation; Sony Electronics Inc. Multiple partial encryption using retuning
7263187, Oct 31 2003 Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A DELAWARE CORPORATION Batch mode session-based encryption of video on demand content
7286667, Sep 15 2003 Sony Corporation; Sony Electronics Inc. Decryption system
7287168, Jun 06 2001 Sony Corporation; Sony Electronics Inc. Partial encryption and PID mapping
7292691, Jan 02 2002 Sony Corporation; Sony Electronics Inc. Progressive video refresh slice detection
7292692, Mar 25 2003 Sony Corporation; Sony Electronics INC Content scrambling with minimal impact on legacy devices
7299292, Mar 29 2002 GOOGLE LLC Process and streaming server for encrypting a data stream to a virtual smart card client system
7302058, Mar 30 1999 Sony Corporation; Sony Electronics Inc. Method and apparatus for securing control words
7302059, Jan 02 2002 Sony Corporation; Sony Electronics Inc. Star pattern partial encryption
7328345, Jan 29 2002 GOOGLE LLC Method and system for end to end securing of content for video on demand
7336787, Jun 06 2001 Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A CORP OF DELAWARE Critical packet partial encryption
7343013, Dec 16 2003 SONY CORPOARTION, A JAPANESE CORPORATION; Sony Electronics INC Composite session-based encryption of video on demand content
7346163, Oct 31 2003 Sony Corporation; Sony Electronics INC Dynamic composition of pre-encrypted video on demand content
7350082, Jun 06 2001 Sony Corporation; Sony Electronics Inc. Upgrading of encryption
7356143, Mar 18 2003 GOOGLE LLC System, method, and apparatus for securely providing content viewable on a secure device
7370342, Jun 12 1998 THOMSON LICENSING, S A S Method and apparatus for delivery of targeted video programming
7376233, Jan 02 2002 Sony Corporation; Sony Electronics Inc. Video slice and active region based multiple partial encryption
7376831, Sep 06 2000 GOOGLE LLC Selectively encrypting different portions of data sent over a network
7380117, Nov 09 1999 GOOGLE LLC Process and streaming server for encrypting a data stream
7406174, Oct 21 2003 GOOGLE LLC System and method for n-dimensional encryption
7508942, Nov 05 2002 Sony Corporation; Sony Electronics Inc. Multi-process descrambler
7530084, May 28 2002 Sony Corporation; Sony Electronics Inc.; Sony Corporation of America; Sony Electronics INC Method and apparatus for synchronizing dynamic graphics
7555464, Mar 01 2006 Sony Corporation; Sony Electronics Inc. Multiple DRM management
7565546, Mar 30 1999 Sony Corporation; Sony Electronics Inc.; Sony Electronics INC System, method and apparatus for secure digital content transmission
7567939, Feb 15 2000 Sony Corporation; Sony Electronics Inc. Method and apparatus for implementing revocation in broadcast networks
7594271, Sep 20 2002 GOOGLE LLC Method and system for real-time tamper evidence gathering for software
7620180, Nov 03 2003 Sony Corporation; Sony Electronics INC Preparation of content for multiple conditional access methods in video on demand
7623662, Nov 03 2003 Sony Corporation; Sony Electronics INC Default encryption and decryption
7640435, Mar 18 2003 GOOGLE LLC System, method, and apparatus for securely providing content viewable on a secure device
7702589, Nov 09 1999 Sony Corporation; Sony Electronics Inc. Method for simulcrypting scrambled data to a plurality of conditional access devices
7711115, Nov 05 2002 Sony Corporation; Sony Electronics Inc. Descrambler
7724907, Nov 05 2002 Sony Corporation; Sony Electronics Inc. Mechanism for protecting the transfer of digital content
7730300, Mar 30 1999 Sony Corporation; Sony Electronics Inc.; Sony Electronics INC Method and apparatus for protecting the transfer of data
7747853, Jun 06 2001 Sony Corporation; Sony Electronics Inc.; Sony Electronics INC IP delivery of secure digital content
7751560, Jun 06 2001 Sony Corporation; Sony Electronics Inc. Time division partial encryption
7765567, Jan 02 2002 Sony Corporation; Sony Electronics INC Content replacement by PID mapping
7817608, Sep 23 2005 GOOGLE LLC Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
7823174, Jan 02 2002 Sony Corporation; Sony Electronics INC Macro-block based content replacement by PID mapping
7853980, Oct 31 2003 Sony Corporation; Sony Electronics Inc. Bi-directional indices for trick mode video-on-demand
7895616, Jun 06 2001 Sony Corporation; Sony Electronics Inc. Reconstitution of program streams split across multiple packet identifiers
7895617, Dec 15 2004 Sony Corporation; Sony Electronics Inc. Content substitution editor
7925016, Mar 30 1999 Sony Corporation; Sony Electronics Inc. Method and apparatus for descrambling content
8041190, Dec 15 2004 Sony Corporation; Sony Electronics Inc. System and method for the creation, synchronization and delivery of alternate content
8055894, Nov 09 1999 GOOGLE LLC Process and streaming server for encrypting a data stream with bandwidth based variation
8065733, Sep 23 2005 GOOGLE LLC Method for evolving detectors to detect malign behavior in an artificial immune system
8087051, Jun 30 2000 THOMSON LICENSING, S A S Database management system and method for electronic program guide and television channel lineup organization
8185921, Feb 28 2006 Sony Corporation; Sony Electronics Inc. Parental control of displayed content using closed captioning
8204220, Sep 18 2008 Sony Corporation; Sony Electronics Inc. Simulcrypt key sharing with hashed keys
8243924, Jun 29 2007 GOOGLE LLC Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
8259940, May 28 2004 VIACCESS Method for broadcasting digital data to a targeted set of reception terminals
8302127, Sep 25 2000 THOMSON LICENSING, S A S System and method for personalized TV
8351763, Jun 12 1998 THOMSON LICENSING, S A S Television program recording with user preference determination
8351765, Jun 12 1998 THOMSON LICENSING, S A S Television program recording with user preference determination
8352984, Jun 12 1998 THOMSON LICENSING, S A S System and method for generating and managing user preference information for scheduled and stored television programs
8386771, Nov 09 1999 GOOGLE LLC Process and streaming server for encrypting a data stream with bandwidth based variation
8396221, Dec 21 2006 Oracle International Corporation Secure broadcasting and multicasting
8488788, Nov 09 1999 Sony Corporation; Sony Electronics Inc. Method for simulcrypting scrambled data to a plurality of conditional access devices
8526612, Jan 06 2006 GOOGLE LLC Selective and persistent application level encryption for video provided to a client
8532075, Sep 23 2005 GOOGLE LLC Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
8538892, Jun 21 2001 THOMSON LICENSING, S A S Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure
8572408, Nov 05 2002 Sony Corporation; Sony Electronics Inc. Digital rights management of a digital device
8621093, May 21 2007 GOOGLE LLC Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network
8621631, Sep 23 2005 GOOGLE LLC Method for evolving detectors to detect malign behavior in an artificial immune system
8640249, Oct 13 2005 Samsung Electronics Co., Ltd Digital broadcasting conditional access system and method
8645988, Dec 13 2002 Sony Corporation; Sony Electronics INC Content personalization for digital content
8667525, Dec 13 2002 Sony Corporation; Sony Electronics Inc. Targeted advertisement selection from a digital stream
8683218, Oct 21 2003 GOOGLE LLC System and method for N-dimensional encryption
8689016, Dec 02 2005 GOOGLE LLC Tamper prevention and detection for video provided over a network to a client
8751800, Dec 12 2011 GOOGLE LLC DRM provider interoperability
8752194, Jun 29 2007 GOOGLE LLC Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
8767966, Dec 21 2006 Oracle International Corporation Secure broadcasting and multicasting
8818871, Jun 21 2001 THOMSON LICENSING, S A S Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure
8818896, Sep 09 2002 Sony Corporation; Sony Electronics Inc. Selective encryption with coverage encryption
8855110, Sep 04 2006 XUESHAN TECHNOLOGIES INC Personal video recorder having improved data access and method thereof
8868464, Feb 07 2008 GOOGLE LLC Preventing unauthorized modification or skipping of viewing of advertisements within content
8891765, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for content decryption module
8938758, Sep 25 2000 THOMSON LICENSING, S A S System and method for personalized TV
8984285, Dec 12 2011 GOOGLE LLC Use of generic (browser) encryption API to do key exchange (for media files and player)
9003558, Dec 12 2011 GOOGLE LLC Allowing degraded play of protected content using scalable codecs when key/license is not obtained
9038147, Jun 29 2007 GOOGLE LLC Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
9110902, Dec 12 2011 GOOGLE LLC Application-driven playback of offline encrypted content with unaware DRM module
9129092, Dec 12 2011 Google Inc. Detecting supported digital rights management configurations on a client device
9183405, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for content protection for HTML media elements
9223988, Dec 12 2011 GOOGLE LLC Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components
9239912, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for content protection using authentication data
9305590, Oct 16 2007 Seagate Technology LLC Prevent data storage device circuitry swap
9311459, Dec 12 2011 GOOGLE LLC Application-driven playback of offline encrypted content with unaware DRM module
9326012, Dec 12 2011 GOOGLE LLC Dynamically changing stream quality when user is unlikely to notice to conserve resources
9338405, May 04 2006 SYNAMEDIA LIMITED Scrambled digital data item
9542368, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for instantiating plugin from within browser
9609279, Sep 24 2004 GOOGLE LLC Method and system for providing secure CODECS
9679602, Jun 14 2006 Seagate Technology LLC Disc drive circuitry swap
9686234, Dec 12 2011 GOOGLE LLC Dynamically changing stream quality of protected content based on a determined change in a platform trust
9697185, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for protection of media objects from the web application environment
9697363, Dec 12 2011 GOOGLE LLC Reducing time to first encrypted frame in a content stream
9697366, Dec 12 2011 GOOGLE LLC Use of generic (browser) encryption API to do key exchange (for media files and player)
9713070, Aug 18 2016 Cisco Technology, Inc.; Cisco Technology, Inc Regional conditional access
9781478, Sep 25 2000 INTERDIGITAL CE PATENT HOLDINGS System and method for personalized TV
9785759, Dec 12 2011 GOOGLE LLC Method, manufacture, and apparatus for configuring multiple content protection systems
9875363, Dec 12 2011 GOOGLE LLC Use of generic (browser) encryption API to do key exchange (for media files and player)
Patent Priority Assignee Title
4228321, May 16 1978 Bell Telephone Laboratories, Incorporated Privacy transmission system with remote key control
4484027, Nov 19 1981 Comsat Corporation Security system for SSTV encryption
4531020, Jul 23 1982 TV COM INTERNATIONAL, INC Multi-layer encryption system for the broadcast of encrypted information
4531021, Jun 19 1980 TV COM INTERNATIONAL, INC Two level encripting of RF signals
4864615, May 27 1988 GENERAL INSTRUMENT CORPORATION GIC-4 Reproduction of secure keys by using distributed key generation data
4866770, Jul 08 1986 Scientific Atlanta, Inc. Method and apparatus for communication of video, audio, teletext, and data to groups of decoders in a communication system
4944006, Mar 12 1987 Zenith Electronics Corporation Secure data packet transmission system and method
5208856, Dec 23 1988 Laboratoire Europeen de Recherches Electroniques Avancees Scrambling and unscrambling method for composite video signals and implementing device
5282249, Nov 14 1989 Cisco Technology, Inc System for controlling access to broadcast transmissions
5301247, Jul 23 1992 Crest Industries, Inc. Method for ensuring secure communications
5481609, Nov 09 1990 Cisco Technology, Inc System for controlling access to broadcast transmissions
5499298, Mar 17 1994 Kent Ridge Digital Labs Controlled dissemination of digital information
5825876, Dec 04 1995 RPX CLEARINGHOUSE LLC Time based availability to content of a storage medium
5852664, Jul 10 1995 HEATHWAY HOLDINGS, LLC Decode access control for encoded multimedia signals
5991400, Oct 31 1995 U S PHILIPS CORPORATION Time-shifted conditional access
6069956, Dec 15 1995 Hitachi, LTD Method and apparatus for encrypting multiplexed data streams using key information continued in streams
6178242, Feb 07 1997 SYNAMEDIA LIMITED Digital recording protection system
EP375539,
EP461029,
RE33189, May 09 1988 Comsat Corporation Security system for SSTV encryption
//////////////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Feb 04 1999NDS Ltd.(assignment on the face of the patent)
Jun 20 1999SERED, YISHAINDS LtdASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0108180077 pdf
Jun 24 1999DALLARD, NIGEL STEPHENNDS LtdASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0108180077 pdf
Apr 28 2009News Datacom LimitedNDS HOLDCO, INC SECURITY AGREEMENT0227030071 pdf
Apr 28 2009NDS LimitedNDS HOLDCO, INC SECURITY AGREEMENT0227030071 pdf
Apr 28 2009News Datacom LimitedJ P MORGAN EUROPE LIMITEDSECURITY AGREEMENT0226780712 pdf
Apr 28 2009NDS LimitedJ P MORGAN EUROPE LIMITEDSECURITY AGREEMENT0226780712 pdf
Mar 10 2011J P MORGAN EUROPE LIMITEDNews Datacom LimitedRELEASE OF PATENT SECURITY INTERESTS0260420124 pdf
Mar 10 2011J P MORGAN EUROPE LIMITEDNDS LimitedRELEASE OF PATENT SECURITY INTERESTS0260420124 pdf
Mar 10 2011NDS HOLDCO, INC News Datacom LimitedRELEASE OF INTELLECTUAL PROPERTY SECURITY INTERESTS0259400710 pdf
Mar 10 2011NDS HOLDCO, INC NDS LimitedRELEASE OF INTELLECTUAL PROPERTY SECURITY INTERESTS0259400710 pdf
Mar 14 2013NDS LimitedCisco Technology, IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0302580465 pdf
Oct 28 2018CISCO SYSTEMS INTERNATIONAL S A R L NDS LimitedASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0474200600 pdf
Oct 28 2018Cisco Technology, IncNDS LimitedASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0474200600 pdf
Oct 28 2018CISCO VIDEO TECHNOLOGIES FRANCENDS LimitedASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0474200600 pdf
Oct 28 2018BEAUMARIS NETWORKS LLCNDS LimitedASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0474200600 pdf
Nov 08 2018NDS LimitedSYNAMEDIA LIMITEDCORRECTIVE ASSIGNMENT TO CORRECT THE 26 APPLICATION NUMBERS ERRONEOUSLY RECORDED AGAINST ON THE ATTACHED LIST PREVIOUSLY RECORDED AT REEL: 048513 FRAME: 0297 ASSIGNOR S HEREBY CONFIRMS THE CHANGE OF NAME 0566230708 pdf
Nov 08 2018NDS LimitedSYNAMEDIA LIMITEDCHANGE OF NAME SEE DOCUMENT FOR DETAILS 0485130297 pdf
Date Maintenance Fee Events
Jan 02 2007M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Jan 03 2011M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Jan 01 2015M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Jul 01 20064 years fee payment window open
Jan 01 20076 months grace period start (w surcharge)
Jul 01 2007patent expiry (for year 4)
Jul 01 20092 years to revive unintentionally abandoned end. (for year 4)
Jul 01 20108 years fee payment window open
Jan 01 20116 months grace period start (w surcharge)
Jul 01 2011patent expiry (for year 8)
Jul 01 20132 years to revive unintentionally abandoned end. (for year 8)
Jul 01 201412 years fee payment window open
Jan 01 20156 months grace period start (w surcharge)
Jul 01 2015patent expiry (for year 12)
Jul 01 20172 years to revive unintentionally abandoned end. (for year 12)